Trending questions in Edureka Community

0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,140 points
42 views
0 votes
0 answers

How do I connect Power BI with SAP BW without performance issues?

How do I connect Power BI with ...READ MORE

Apr 16 in Power BI by Evanjalin
• 30,660 points
38 views
0 votes
1 answer

How can I integrate JIRA with Confluence to streamline Agile project documentation?

Integrating JIRA and Confluence can dramatically improve ...READ MORE

Apr 15 in PMP by Naira
67 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
42 views
0 votes
1 answer

Who are the three main participants in the man in the middle attack?

​In a Man-in-the-Middle (MitM) attack, three primary ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
58 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
47 views
0 votes
1 answer

What is the role of OID values in SNMP enumeration?

​Object Identifiers (OIDs) are fundamental in Simple ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
71 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
39 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
39 views
0 votes
1 answer

Design a workflow to generate context-aware embeddings for legal document indexing in LLamaIndex.

You can generate context-aware embeddings for legal ...READ MORE

Apr 21 in Generative AI by mimi
52 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
54 views
0 votes
1 answer

What’s the difference between burndown and burnup charts in Scrum dashboards?

Burndown and burnup charts are crucial Scrum ...READ MORE

Apr 15 in PMP by Naira
61 views
0 votes
1 answer

What is firewalking, and how does it bypass firewalls?

Firewalking is a network reconnaissance technique that ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
68 views
0 votes
1 answer

What are best practices for securing DNS enumeration?

​DNS enumeration is a technique used by ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
96 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
49 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
49 views
0 votes
1 answer

Can DNS zone transfers be used for attacks other than enumeration?

DNS zone transfers (AXFR) are legitimate mechanisms ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
66 views
0 votes
1 answer

What are countermeasures against VoIP enumeration attacks?

To prevent SIP endpoint and extension enumeration ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
51 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16 in Power BI by pooja
• 23,870 points
31 views
0 votes
0 answers

how to Implement a ReAct prompting strategy for a multi-turn dialogue system?

May i know how to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
44 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,140 points
32 views
0 votes
1 answer

How do you establish OKR tracking in Notion or ClickUp?

OKRs (Objectives and Key Results) are an ...READ MORE

Apr 15 in PMP by Naira
46 views
0 votes
1 answer

How does ZMap compare to Nmap in network scanning?

ZMap and Nmap are both powerful network ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
64 views
0 votes
0 answers
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15 in PMP by Naira
38 views
0 votes
1 answer

What’s the best method to apply Critical Path Analysis (CPA) in ProjectLibre?

ProjectLibre is a free alternative to MS ...READ MORE

Apr 14 in PMP by Naira
84 views
0 votes
1 answer

How does AI collect information?

Artificial Intelligence (AI) collects and processes data ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
61 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
40 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
29 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
59 views
0 votes
1 answer

How does Wireshark detect port scanning attempts?

​Wireshark is a powerful network protocol analyzer ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
87 views
0 votes
1 answer

How can attackers exploit IPsec security associations?

​IPsec Security Associations (SAs) are fundamental to ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
42 views
0 votes
0 answers

How would you design a generative model that self-corrects biased or hallucinated outputs?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
36 views
0 votes
1 answer

How can you extract data using NetBIOS Name Service (NBNS)?

NetBIOS Name Service (NBNS), also known as ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
56 views
0 votes
1 answer

What reason would you use the decoy scan option for Nmap?

The --decoy option in Nmap is designed ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
56 views
0 votes
1 answer

What is the difference between hping2 and Hping3?

Hping2 vs. Hping3: Key Differences in Features, ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
55 views
0 votes
1 answer

How does AI detect invasive scanning techniques?

AI enhances network security by detecting invasive ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
55 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
33 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 28,650 points
33 views
0 votes
1 answer

How do you generate dynamic Gantt charts with real-time task dependencies in Smartsheet?

Smartsheet offers dynamic Gantt charts that visually ...READ MORE

Apr 14 in PMP by Naira
75 views
0 votes
1 answer

What is TCP Connect scanning, and when is it used?

​TCP Connect scanning is a fundamental port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
52 views
0 votes
1 answer

What’s the impact of Theory of Constraints (TOC) in project bottleneck management?

Eliyahu Goldratt invented the Theory of Constraints ...READ MORE

Apr 14 in PMP by Naira
74 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
51 views
0 votes
1 answer

What indicates that a port is closed during a stealth scan?

​In a stealth scan, such as Nmap's ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
50 views
0 votes
1 answer

What is NULL scanning, and how is it used?

​A NULL scan is a network reconnaissance ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
75 views
0 votes
1 answer

How does machine learning detect anomalies in port scans?

​Machine learning (ML) models are increasingly employed ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
73 views
0 votes
1 answer

How does AI predict the best scanning method for networks?

Artificial Intelligence (AI) enhances network scanning by ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,940 points
72 views
0 votes
1 answer

How do you integrate Jira Advanced Roadmaps for multi-team backlog planning and dependency tracking?

Jira Advanced Roadmaps (previously Portfolio for Jira) ...READ MORE

Apr 14 in PMP by Naira
68 views
0 votes
1 answer

What are the key differences between forward pass and backward pass calculations in project networks?

Forward pass and backward pass are two ...READ MORE

Apr 14 in PMP by Naira
65 views